chapter 8 computer science
firewall
software or hardware that creates a blockade between a computer system or network and the internet
electronic wallet
software that stores and securely processes the financial information you enter when you finalize an online purchase
viruses
software that travels through networks to harm computer programs.
wi-fi piggybacking
tapping into an unprotected Wi-Fi network
internet addiction
the excessive use of the internet for gaming, video, web surfing, texting, blogging, social networking, or shopping
cyberterrorism
the premeditated use of malware such as viruses and worms to disrupt computers and networks, causing data loss, theft, or harm
phishing
a scam that uses email or social media try to trick a user into revealing personal information on the pretense of being the users bank or other legitimate institution
encryption
a security method that scrambles or codes data as it is transmitted over a network or that makes digital content unreadable unless viewed with a valid encryption key or authorized hardware device
worm
a self-replicating program that consumed system resources
magnetic hard drives
a storage device made up of one or more disks (or platters) that spin on a spindle, and read/write heads that move over the surface of the disks to save and retrieve data. the disks use magnetized particles to store data as bits
solid state hard drives
a storage device that has no moving parts and is relatively stable; used in portable computers
antivirus
a program that finds and removes viruses, trojan horses, worms, and bots from a computer and scans incoming and outgoing email messages to identify threats
antispyware
a program that prevents spyware from installing itself on a computer and removes any existing spyware
war driving
a practice in which someone searches for an maps unsecured wi-fi networks from a vehicle, gains access to your system, and then can pose as another person online to download illegal content in his or her name
hackers
a person that uses computers and networks without authorization to access valuable data and services without being detected
identity thief
a person who obtains personal information from online and real world sources to gain enough information to impersonate you for financial gain without your knowledge
cyberterrorists
a person who uses automated malware such as viruses and worms to disrupt computers and networks, causing data loss, theft, or harm
service packs
a collection of files that software publishers issue as a major update to software repair problems, enhance features, and improve performance and security of a program
wireless router
a device that allows computer to connect wirelessly to a local network or to the internet; might be plugged into a wall outlet for power
uninterruptible power supply
a device that provides battery backup for a short period in the event of a power failure
hoax
a fake coupon, threat, or story sent in an email or social media post that warns about a nonexistent virus or event to prompt you to clink a link that can be used to install malware
hacktivists
a hacker that accesses computers without authorization for the purpose of intention of a social goal or impact for a political cause
black hat
a member of the destructive hacker community
white hat
a member of the nondestructive hacker community
pharming
a web site scam to obtain personal information in which a server is hacked and used to reroute traffic from what looks like a legitimate web site to a fake web site
carpal tunnel syndrome
an RSI that affects the wrist, hand, and arm, and is aggravated by prolonged keyboarding or gesturing on tablets
hotspots
an area in a wireless network where you can access the internet
Blue Screen of Death
common term for the screen displayed when a hard drive fails on a computer running the windows operating system
cybercrime
an illegal act of committed using a computer on a network or over the internet
repetitive strain injuries (RSIs)
an injury caused by performing the same movement repeatedly, such as by using of computers, tablets, smartphones, and other electronic devices
incognito/inprivate mode
browser setting that allows you to avoid being tracked through your browser when visiting web sites and shopping online
computer vision syndrome
eyestrain, headaches, dry eyes, blurry vision, or even double vision as a result of prolonged digital viewing on screens
netiquette
internet etiquette; the rules for appropriate online behavior
spam
junk email messages
malware
malicious software, including viruses and spyware, that installs itself without permission and damage data and programs
cloud storage systems
online storage system used for backups; provides additional data protection
online identity
personal photos, videos, purchases, public posts, comments, and information forwarded through web sites and social networking
online profile
personal photos, videos, purchases, public posts, comments, and information forwarded through web sites and social networking
cyberattack
physical damage and a general disruption of regular activities caused by a hacker or cyberterrorist on a computer network
ergonomics
the study of safe and efficient working environments
biometrics
the use of personal features to identify a person; includes fingerprint scanners, facial recognition technology, and retinal scans
cyberbullying
to use web technologies to harass or intimidate people online annoying or unwelcome messages
cyberstalking
to use web technologies to monitor or track the activities of whereabout of someone online